Skip to main content

Steg is a simple python library for hiding and extracting messages from losslessly compressed images using least-significant-bit (LSB) steganography.

Project description

Steg

Ochrona

Steg is a simple python library for hiding and extracting messages from losslessly compressed images using least-significant-bit (LSB) steganography. Current supported image formats include PNG, TIFF, BMP, and ICO. Steg also includes a command line tool for quick hiding and extraction.

Installation

$ pip install steg

Usage in Code

# Import library
from steg import steg_img

# Hiding
# Select your payload and carrier files
s = steg_img.IMG(payload_path=<payload path>, image_path=<carrier path>)
# Create a new image containing your payload
s.hide()

# Extracting
# Select the carrier image
s_prime = steg_img.IMG(image_path=<path of containing hidden payload>)
# Extract the payload
s_prime.extract()

Commandline Usage

  1. To hide a payload in an image: $ steg -c <your image file> -p <your payload>
  2. To extract a payload from a carrier: $ steg -c <your image file>

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Files for steg, version 0.1.5
Filename, size File type Python version Upload date Hashes
Filename, size steg-0.1.5-py3-none-any.whl (8.5 kB) File type Wheel Python version py3 Upload date Hashes View
Filename, size steg-0.1.5.tar.gz (5.6 kB) File type Source Python version None Upload date Hashes View

Supported by

AWS AWS Cloud computing Datadog Datadog Monitoring DigiCert DigiCert EV certificate Facebook / Instagram Facebook / Instagram PSF Sponsor Fastly Fastly CDN Google Google Object Storage and Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Salesforce Salesforce PSF Sponsor Sentry Sentry Error logging StatusPage StatusPage Status page